Athena Training and Consulting

Athena Training and Consulting

  • Menu
  • Account
  • Home
  • Founder
    • Cindy Stradling
  • Program
    Offerings
  • Perfect Fit
    System
    • Vision – Mission
    • Who Are We
    • Why Athena? Clients Say it best…
    • Perfect Fit Process
  • Alliance
    Partners
    • Join the Alliance
  • Clients
  • Blog
  • Contact
LET’S GET SOCIAL
  • Member Login

Illegitimate Software – Don’t Go There!

  • Home
  • Illegitimate Software – Don’t Go There!
  • Articles
  • 2010
  • Illegitimate Software – Don’t Go There!

Illegitimate Software – Don’t Go There!

2010, Articles
1791 Views

April 1, 2011

Illegitimate Software – Don’t Go There!

Ever get spam email selling name-brand software at discount prices? You might get offers for products from Microsoft, Adobe and other major publishers at half the ordinary price, or better.

Sounds too good to be true? Well, it is, for several reasons. First, here’s what you’re likely getting: software that is likely “cracked,” or that has pirating protection stripped from it, so that anybody can install it without entering valid product keys.

So why should you not buy and install cracked software? If you do, you break copyright laws and deny software publishers their rightful revenues.

Granted, few people cry if companies like Microsoft lose a sale. OK, here’s another reason: cracked software often gives you more than you bargain for. The stuff you install may include malware that:

  • Logs your keystrokes and sends those logs (which may include sensitive information, like passwords) to the “vendor’s” servers.
  • Lets other people take control of your computer.
  • Otherwise messes up your computer.

These warnings go for any operating system, whether it be Windows, Mac or Linux. That’s because installing software obliges you to enter your administrative password, which in turn lets the software lodge itself deep in your system, where it can do harm.

A cautionary tale: early in the 21st century, file-sharing service Kazaa let people swap files for free. To use the service, people installed Kazaa software on their computers. Aside from letting people download music and share their own, it also installed spyware and adware, unwanted components that did not necessarily leave computers when people uninstalled them. This stuff might have been mentioned in the end user licence agreement (EULA) but really, how many people read those tangled webs of legalese?

By Luigi Benetton

Download the Outsourcing Training Checklist!

Please complete the form for the download link.

By clicking the Download button, I consent to receive blog post notifications from Athena Training and Consulting.

We don’t spam! Read our privacy policy for more info.

Share this post
Gratitude Makes You A Better Manager
Laughing Our Way to Workplace Wellness

Search

About Athena

  • Perfect Fit Process
  • Vision – Mission
  • Who Are We
  • Why Athena?
  • Perfect Fit System
  • Cindy Stradling

Alliance Partners

  • Clients
  • Join the Alliance
  • Privacy Policy

Cindy Stradling

https://www.youtube.com/watch?v=2Nqnf9fv6xg

Our Clients Say

Copyright 2021 | ATHENA TRAINING AND CONSULTING